Discover more from ESSGroup
Subscribe to get the latest posts sent to your email.
Threat Overview
A new infostealer called VIPKeyLogger has been observed with increased activity. It shares similarities with Snake Keylogger and is distributed through phishing campaigns. The malware is delivered as an archive or Microsoft 365 file attachment, which downloads and executes a .NET compiled file. HIPKeylogger utilizes steganography to hide obfuscated code within a bitmap image. It exfiltrates various data types including PC names, country names, clipboard data, screenshots, cookies, and browser history. The stolen information is sent via Telegram to Dynamic DuckDNS C2 servers. The attack chain involves multiple stages, from initial email lure to payload execution and data exfiltration.
Tactics, Techniques, and Procedures (TTPs)
The threat actor exfiltrates information via Dynamic DuckDNS C2 servers. The attack chain involves multiple stages from initial email lure to payload execution and data exfiltration.
Network Traffic Patterns
Attack Patterns
The use of real or fabricated credentials is part of the attack pattern used to create the illusion that they are valid employees using legitimate systems, allowing attackers to bypass security controls.
HIPKeylogger has also been deployed via Office documents as an attachment or embedded in malicious links. This method may not raise suspicions among users who regularly receive these types of attachments and links.
Malware Components
The use of Open-source code, making it easier for threat actors to adapt the tool to different attack situations
This allows them to rapidly respond the evolving nature of security controls. \\n HIPKeylogger contains malicious components designed to remain under suspicion for extended periods after deployment.
Exfiltration and Analysis
This allows attackers to obscure their IP addresses, further complicating detection efforts.
Recommendations
Based on the threat report, several recommendations can be made for improving cybersecurity posture:
Improve security training and awareness programs to educate employees and organizations on the tactics of malicious actors.
Implement strict access controls around sensitive systems.
Subscribe to get the latest posts sent to your email.
Lorem Ipsum is simply dummy text of the printing and typesetting
industry. Lorem Ipsum has been the industry's
Threat Report: Stealers on the Rise
Published: Feb 4, 2025
Short Description:
This report examines the increasing prevalence of macOS infostealers, focusing on three prominent threats: Atomic Stealer, Poseidon Stealer, and Cthulhu Stealer. These malware variants target sensitive information such as financial details, credentials, and intellectual property.
Distribution Methods:
– Malicious apps disguised as legitimate software (e.g., cracks for paid applications)
– Phishing emails with malicious attachments or links
– Exploit kits and malvertising
Execution Processes:
– Atomic Stealer: Uses launch agents to persistently run the malware upon login.
– Poseidon Stealer: Utilizes a legitimate software’s signature to bypass Gatekeeper restrictions.
– Cthulhu Stealer: Employs a custom launcher that uses task scheduling API for persistence.
Data Exfiltration Techniques:
– Data is sent via HTTP(S) to command and control (C2) servers managed by threat actors.
– Some stealers also exfiltrate data stored in the Keychain, browsers, and other sensitive locations.
Threat Trends:
– There was a 101% increase in macOS infostealer detections between the last two quarters of 2024.
Recommendations:
External References:
Threat Report Overview
According to a recent report published by Sand-Storm on May 22, 2025, at 12:16:58.058Z, a new cyber campaign is targeting Western logistics entities and technology companies. This campaign is attributed to the Russian state-sponsored hacking group known as the GRU (Main Directorate of the General Staff of the Armed Forces of the Russian Federation). The report was issued by US and European intelligence agencies in collaboration with CISA (Cybersecurity and Infrastructure Security Agency).
Key Details
The report outlines a highly coordinated cyber campaign aimed at infiltrating critical infrastructure within Western nations. This involves sophisticated tactics, techniques, and procedures (TTPs) designed to compromise sensitive information from logistics firms and technology companies.
Threat Actor Group Description
The GRU is recognized for its involvement in various high-profile cyber-espionage operations across the globe. The group employs a diverse range of attack vectors including malware, phishing campaigns, and exploits on known software vulnerabilities.
Report Summary
The intelligence report underscores the seriousness with which the Russian GRU is targeting Western logistics and technology sectors. This targeted approach poses significant risks to national security, economic stability, and intellectual property theft. The confidence level in this report stands at 100%, deeming it highly reliable.
Connected Elements and External References
The detailed report contains a substantial number of connected elements—920 in total—each contributing to the understanding and mitigation of the threat posed by these cyber campaigns. For further insights, readers are encouraged to consult additional resources available on CISA’s official page and other external references provided below:
Recommendations for Mitigation
1. Enhance Security Posture: Strengthen cybersecurity measures across logistics and technology companies to safeguard against these targeted attacks.
2. Regular Updates: Ensure all software and security systems are up-to-date with the latest patches to mitigate vulnerabilities that could be exploited by GRU-affiliated hackers.
3. Employee Training: Conduct regular training sessions for employees on recognizing phishing attempts and other social engineering tactics commonly used by threat actors.
4. Incident Response Plan: Develop and regularly update an incident response plan to quickly address any detected breaches or anomalies within the network infrastructure.
5. Collaboration: Share information with other organizations and government agencies to foster a collective defense strategy against such threats.
By adhering to these recommendations, organizations can better protect themselves from the evolving cyber threats posed by state-sponsored actors like the GRU.
In the ever-evolving landscape of cyber threats, staying ahead of malicious actors is a constant challenge. The latest threat report published by AlienVault on March 5, 2025, sheds light on a new update in the Remcos infection chain that enhances its stealth capabilities through advanced evasion tactics. This report, titled ‘Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered,’ provides crucial insights into how this malware is adapting to avoid detection.
The SonicWall threat research team discovered that the Remcos Remote Access Trojan (RAT) has been updated to patch Anti-Malware Scan Interface (AMSI) scanning and Event Tracing for Windows (ETW) logging. These updates are designed to make the malware more difficult to detect, allowing it to operate undetected within compromised systems.
Remcos RAT is known for its ability to distribute other malicious software, including Async RAT. However, this latest update extends its functionality to include Remcos RAT and other malware families, making it a versatile and dangerous threat. The report indicates that European institutions are the primary targets of this updated infection chain.
The new evasion tactics employed by Remcos RAT involve patching AMSI scanning and ETW logging. AMSI is a critical component in Windows 10 and later versions that allows applications to integrate with antivirus software for real-time malware detection. By patching AMSI, the malware can bypass this layer of security, making it harder for traditional antivirus solutions to detect its presence.
Similarly, ETW logging provides detailed information about system events, which is essential for monitoring and diagnosing issues within a network. By disabling ETW logging, Remcos RAT can operate more stealthily, avoiding detection by security tools that rely on event logs for threat identification.
The report highlights the importance of staying vigilant against evolving threats. As cybercriminals continue to develop new tactics to evade detection, organizations must adapt their security measures accordingly. This includes implementing advanced threat detection and response solutions that can identify and mitigate sophisticated malware like Remcos RAT.
One of the key recommendations from the report is to enhance endpoint protection by deploying next-generation antivirus (NGAV) solutions. These tools are designed to detect and block advanced threats, including those that employ evasion tactics like patching AMSI and disabling ETW logging. Additionally, organizations should consider implementing Endpoint Detection and Response (EDR) solutions, which provide real-time monitoring and response capabilities.
Another crucial recommendation is to conduct regular security audits and penetration testing. These activities help identify vulnerabilities within an organization’s network that could be exploited by malicious actors. By proactively addressing these weaknesses, organizations can reduce the risk of a successful attack.
Furthermore, the report emphasizes the importance of employee training in cybersecurity best practices. Human error remains one of the leading causes of security breaches, and educating employees on how to recognize and respond to potential threats can significantly enhance an organization’s overall security posture.
In addition to these recommendations, organizations should also consider implementing a Security Information and Event Management (SIEM) system. SIEM solutions provide centralized monitoring and analysis of security-related data from various sources, enabling organizations to detect and respond to threats more effectively.
The report also highlights the need for collaboration between cybersecurity professionals and threat intelligence sharing communities. By exchanging information on emerging threats and best practices, organizations can stay informed about the latest developments in the cyber threat landscape and adapt their defenses accordingly.
In conclusion, the discovery of new evasion tactics employed by Remcos RAT underscores the importance of staying proactive in the face of evolving cyber threats. Organizations must continuously update their security measures to address emerging risks and protect against sophisticated malware like Remcos RAT. By implementing advanced threat detection solutions, conducting regular security audits, providing employee training, and collaborating with the cybersecurity community, organizations can enhance their resilience against these ever-evolving threats.
For additional information on this threat report, please visit the following links:
https://www.sonicwall.com/blog/remcos-rat-targets-europe-new-amsi-and-etw-evasion-tactics-uncovered
https://otx.alienvault.com/pulse/67c8664cabae3f59536c42e2
Subscribe now to keep reading and get access to the full archive.